Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for accessing Web services and URL resources for both primary and shared users over a reverse tunnel mechanism

Inactive Publication Date: 2007-07-26
BUNGEE LABS INC
View PDF56 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0012] An embodiment of the invention may provide a way to stream and access Web services and URL resources over another allowed or more standard protocol and port in a secure fashion. An embodiment of the present invention may use established tunneling techniques to innovatively pass logical and semantic bits of data, as well as application resources, from a secure LAN by “piggy-backing” a Web service such as a service using the SOAP protocol over another allowed or more standard protocol such as the HTTP protocol on port 80.
[0020] Replacing the typical traditional requirement to create security exposure points in the environment by “punching holes in the firewall” in order to access secured network resources at the semantic or logical level is very useful. Rather than creating such exposure points for hackers to try to violate the secured network firewall, an isolated and standards-based mechanism for external access of resources located within a protected LAN can be achieved.

Problems solved by technology

The creation of “firewalls” (hardware, software, or both), data protection devices that effectively block all unwanted incoming Internet traffic, created a second problem while solving the first.
Unfortunately, while firewalls do provide protection by making it possible for corporate network administrators to restrict both ports and data content types, needed firewall configurations often hinder effective business and private communications that are both harmless and business strategic.
Virtual Private Networks are powerful in that they make remote access and work possible, yet they are very clumsy because they are image based.
These “screen-scraping” techniques are very bandwidth heavy and often result in very noticeable latency issues, leading to high levels of frustration among those who depend on this methodology to remotely access their corporate data.
In addition, some tunneling protocols are not as secure as others.
Currently however, there is no secure procedure for accessing Web services and URL resources securely located behind a secured network such as a corporate LAN.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for accessing Web services and URL resources for both primary and shared users over a reverse tunnel mechanism
  • Method and apparatus for accessing Web services and URL resources for both primary and shared users over a reverse tunnel mechanism
  • Method and apparatus for accessing Web services and URL resources for both primary and shared users over a reverse tunnel mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] A method and apparatus for securely accessing Web services and URL resources located within a protected environment, such as a corporate LAN, from outside that environment are described. In the following description of the method and apparatus, many specific details are provided to offer a more thorough explanation of embodiments of the invention. To one skilled in the art, however, it will be clear that the invention may be accomplished without these specific details. In other cases, obvious elements have not been described at length, so as not to render the invention ambiguous.

Terminology

[0025] Throughout the following explanation, mention of a “user” may refer either to a person interacting with a computer interface, to one or more software program elements (such as a user interface), or both. A program element may be any element of a computer program, whether that executes remotely or locally, as that element interacts with an embodiment or embodiments of the invention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus for accessing Web services and URL resources for both primary and shared users over a reverse tunnel mechanism are provided. Current limitations on accessing Web services and URL resources located behind firewalls or otherwise made secure and largely inaccessible are overcome through a novel use of a “reverse tunneling” mechanism. The mechanism uses an Agent to obfuscate physical address endpoints of Web services and other resources, as well as to package SOAP service requests in such a way that they can be passed through firewalls unimpeded. All of this data transfer is made secure through encryption, strong authentication, and by making use of the security environment on both a user's individual device and the LAN proper. In addition, a primary user may share data access rights within the secure LAN environment to a secondary user and, using the present invention, provide only those access rights to the shared user over the open Internet.

Description

BACKGROUND OF THE INVENTION [0001] 1. Field of the Invention [0002] This invention relates to the area of tunneling, and more specifically, to using a tunneling mechanism to securely access Web services and URL resources located on a network protected by a firewall, and make those resources securely available to strongly authenticated users in the open Internet environment. [0003] 2. Background Art [0004] As the Internet grew in importance as a business communications backbone, keeping corporate data secure from Internet raiders known as “hackers” became a top priority. The creation of “firewalls” (hardware, software, or both), data protection devices that effectively block all unwanted incoming Internet traffic, created a second problem while solving the first. [0005] In order to make a corporate network secure, firewall administrators close down all but a few needed ports into the corporate site and drastically restrict the types of data allowed to be transferred in and out of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F15/173
CPCH04L63/029H04L63/12H04L63/0807
Inventor MITCHELL, DAVID C.EKSTROM, JOSEPH C.SALISBURY, LINHAMILTON, SCOTT E.
Owner BUNGEE LABS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products